The EPSON WF-2750 printer is a multi-functional printer for home and small office use. The printer has multiple connection points through Wi-Fi. Remote printing is one of the major features of this printer. Users can remotely print form mobile apps, web browsers, and...

Finding and exploiting command injection vulnerabilities can have tremendous reward for the time invested. One thing that makes this type of vulnerability extremely nasty in IoT/embedded devices, is that web server processes are often running with root privileges...

When considering where to spend limited penetration testing resources, most organizations (and penetration testing shops) focus on the typical mix of servers and workstations normally found in every organization. While this is a necessary area of focus, other things...

From the 90s to 2015ish memory corruption bugs in C/C++ programs, which lead to control flow hijacks (think buffer overflows etc.) were one of the hottest topics in security. There were all kinds of talks, research projects, mitigations like EMET to stop ROP, etc. ...

The first full week started 2018 with a bang in the information security space when two new vulnerabilities were disclosed. These new vulnerabilities, dubbed Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753), allow for sensitive information to be leaked from...